gnupg1 (1.4.20-7ubuntu1) yakkety; urgency=medium

  * Merge with Debian. Remaining Ubuntu changes:
    - Disable mlock() test since it fails with ulimit 0 (on buildds).
    - Set gpg (or gpg2) and gpgsm to use a passphrase agent by default.
    - Enable SHA-512 support in gpgv-udeb.
  * Dropped changes, gnupg1 will not be in default installs:
    - Only suggest gnupg-curl and libldap; recommendations are pulled into
      minimal, and we don't need the keyserver utilities in a minimal Ubuntu
      system.
  * Dropped changes:
    - Not present in Debian any more: Disable inline assembler for ppc64el.
    - Drop lp1541925.patch, present in Debian as
      0006-g10-Make-sure-to-have-the-directory-for-trustdb.patch
  * SECURITY UPDATE: random number generator prediction
    - debian/patches/CVE-2016-6313-1.patch: improve readability by using a
      macro in cipher/random.c.
    - debian/patches/CVE-2016-6313-2.patch: hash continuous areas in the
      csprng pool in cipher/random.c.
    - CVE-2016-6313
gnupg1 (1.4.20-7) unstable; urgency=medium

  * Release to unstable.

gnupg1 (1.4.20-6+exp5) experimental; urgency=medium

  * two more fixes from upstream
  * build-depend explicitly on automake

gnupg1 (1.4.20-6+exp4) experimental; urgency=medium

  * make debian/copyright even more detailed.

gnupg1 (1.4.20-6+exp3) experimental; urgency=medium

  * rename source package from gnupg to gnupg1
  * convert packaging to modern dh
  * break out an arch-indep gnupg1-l10n package
  * pull in several as-yet-unreleased upstream fixes
  * fix upstream spelling errors and clean up lintian warnings
  * update debian/watch, debian/control, and debian/copyright

gnupg (1.4.20-6+exp2) experimental; urgency=medium

  * corrected Conflicts with older gnupg binaries (Closes: #821910)

gnupg (1.4.20-6+exp1) experimental; urgency=medium

  * ship binary packages gpgv1 and gnupg1, since gnupg2 source package is
    now providing gpgv and gnupg in experimental

 -- Dimitri John Ledkov <x...@ubuntu.com>  Wed, 31 Aug 2016 11:47:54
+0100

** Tags added: block-proposed

** Changed in: gnupg2 (Ubuntu)
       Status: New => In Progress

** Changed in: gnupg1 (Ubuntu)
       Status: New => Fix Committed

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-6313

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1615039

Title:
  [FFe] /usr/bin/gnupg --version should be 2.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnupg/+bug/1615039/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to